Today, a massive cyber attack has bedridden the IT systems of several NHS hospitals. Across engl across England, banishment some trusts to alter emergency patients and send advisers home, causing chaos.

According to The Guardian, computers in several NHS England hospitals have been accompanying struck, locking clinicians out until a ransom had been paid. A photo of the malware shows that the ransomware is asking for $300 to be paid in Bitcoin.

In accession to several local GPs surgeries across Liverpool and Greater Manchester, the afterward trusts have been accepted to be impacted:

  • East and North Hertfordshire NHS trust
  • Barts Health in London
  • Essex Partnership University NHS Trusts
  • University Hospitals of Morecambe Bay NHS Foundation Trust
  • Southport and Ormskirk Hospital NHS Trust
  • Blackpool Teaching Hospital NHS Foundation Trust

In response, several trusts and hospitals have been forced to cancel non-essential surgeries, and are requesting patients not attend A&E (accident and emergency) unless it’s actually essential.

In acknowledgment to the chaos, some hospitals have been forced to send advisers home.

In a statement, NHS Digital said:

A number of NHS organisations have appear to NHS Digital that they have been afflicted by a ransomware attack.

The analysis is at an early stage but we accept the malware alternative is Wanna Decryptor.

This attack was not accurately targeted at the NHS and is affecting organisations from across a range of sectors.

At this stage we do not have any affirmation that accommodating data has been accessed.

NHS Digital is alive carefully with the National Cyber Aegis Centre, the Department of Health and NHS England to abutment afflicted organisations and ensure accommodating safety is protected.

Our focus is on acknowledging organisations to manage the adventure apace and decisively, but we will abide to acquaint with NHS colleagues and will share more advice as it becomes available.

It’s believed that the ransomware is the WanaCrypt0r 2.0 ransomware, which has spread through several high-profile targets today. According to aegis artist Kevin Beaumont, it spreads by adulterated machines abutting a network, rather than the acceptable ransomware attack vector, which is awful attachments.

Several aboveboard individuals have said the ransomware takes advantage of EternalBlue – an accomplishment for SMB originally apparent by the NSA, and appear to the public through the ShadowBrokers leak.

One aggregation decimated by this is the Spanish telco Telefonica. According to El Mundo, 85 percent of Telefonica computers are adulterated with the malware. The paper noted that the aggregation has instructed advisers to turn off their computers, and abstract from the aggregation centralized VPN.

Employees of Telefoninica, speaking to Bleeping Computer, said that the aggregation had instructed them to abstract from the Wi-Fi, and that letters are being advertisement on the headquarter’s apostle system instructing them to shut down their machines.

According to El Pais, the ransomware attack has also attacked the systems of consultancy group KPMG and Spanish bank Santander. Spanish bank BBVA denied on Cheep that it has fallen victim to the ransomware.

Update 1:20 (PST): Microsoft is aware of the problem, and has issued a fix to assure those not yet infected, as well as alerting those that are, according to . “Today our engineers added apprehension and aegis adjoin new awful software known as Ransom:Win32.WannaCrypt.”

Read next: Create a advancing online business — and learn to do it at your price